Preferred Language
Articles
/
jkmc-460
Unstable Angina /Non ST Elevation Myocardial Infarction: Frequency of Conventional Risk Factors; TIMI Risk Score, and Their Impact On Angiographic Data
...Show More Authors

Background: Appreciation of the crucial role of risk factors in the development of coronary artery disease (CAD) is one of the most significant advances in the understanding of this important disease. Extensive epidemiological research has established cigarette smoking, diabetes, hyperlipidemia, and hypertension as independent risk factors for CADObjective: To determine the prevalence of the 4 conventional risk factors(cigarette smoking, diabetes, hyperlipidemia, and hypertension) among patients with CAD and to determine the correlation of Thrombolysis in Myocardial Infarction (TIMI) risk score with the extent of coronary artery disease (CAD) in patients with unstable angina /non ST elevation myocardial infarction (UA/NSTEMI).Methods: We conducted a descriptive study among 100 patients admitted with UA/NSTEMI to three major cardiac centers in Iraq: Iraqi Centre for Heart Disease ,Ibn- Al-Bitar Hospital for cardiac surgery and Al -Nasyria Cardiac Centre from January 2010 to January 2o11.Frequency of each conventional risk factors and number of conventional risk factors present among patients with CAD, compared between men and women and by age are estimated at study entry. The TIMI risk score was stratified on seven standard variables. The extent of CAD was evaluated on angiography and significant CAD was defined as ≥ 70% stenosis in any one of the three major epicardial vessels and ≥50% in LMS.Results : Among 100 patients with UA/NSTEMI , 82% of patients have one or more risk factors and only 18%of patients lacked any of 4 conventional risk factors.Smoking is the most common risk factor in male patients while diabetes mellitus and dyslipidemia are common among female patients, and all these results are statistically significant.There were 64 % patients with TIMI score < 4 (low and intermediate TIMI risk score) and 36% patients with TIMI score >4 (high TIMI risk score). Patients with TIMI score > 4 were more likely to have significant three vessel CAD and LMS versus those with TIMI risk score < 4 who have less severe disease (single and two vessel disease).Conclusion: Antecedent major CAD risk factor exposures were very common among those who developed CAD emphasizing the importance of considering all major riskfactors in determining CAD risk estimation . Patients with a high TIMI risk score were more likely to have severe multivessel CAD compared with those with low or intermediate TIMI risk score. Hence, patients with TIMI score >4 should be referred for early invasive coronary evaluation to derive clinical benefit.Key words: unstable angina , Thrombolysis in Myocardial Infarction score, risk factors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 27 2025
Journal Name
Iraqi Journal Of Science
Elastic Electron Scattering Form Factors and Charge Densities for Some Nuclei in 2s-1d Shell Using the Effect of Occupation Numbers
...Show More Authors

Elastic electron scattering form factors, charge density distributions and charge,neutron and matter root mean square (rms) radii for P24PMg, P28PSi and P32PS nuclei arestudied using the effect of occupation numbers. Single-particle radial wave functionsof harmonic-oscillators (HO) potential are used. In general, the results of elasticcharge form factors showed good agreement with experimental data. The occupationnumbers are taken to reproduce the quantities mentioned above. The inclusion ofoccupation numbers enhances the form factors to become closer to the data. For thecalculated charge density distributions, the results show good agreement withexperimental data except the fail to produce the hump in the central region for P28PSinucleus.

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of The economic And External Factors In Selecting Aggregate Planning Alternatives For Workforce Case Study In Yarmouk Teaching Hospital
...Show More Authors

The research aimed to achieve many objectives represented in two variables, which are the impacted factors and the aggregate planning alternatives of workforce in Educational Al- yarmouk Hospital , This research started from a problem focused on finding solutions to the demand’s  fluctuation  or the energy limitation while the study importance is emerged from diagnosis the suitable strategy and adopt the suitable alternatives due to their importance in meeting the demand for the health service submitted by the hospital .This study  based on choosing assumptions of connection relationship and the impact among the mentioned variables in the(surgery and internal diseases) departments. The research is dependent on ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Genotypic Study of Two Virulence Factors fimH and kpsMTII in Uropathogenic Escherichia coli Isolates from Children Patients with Urinary Tract Infections
...Show More Authors

Adhesion (type 1 fimbriae) and host defense avoidance mechanisms (capsule or lipopolysaccharide) have been shown to be prevalent in Escherichia coli isolates associated with urinary tract infections. In this work, 50 uropathogenic Escherichia coli (UPEC) isolated from children with urinary tract infections were genotypically characterized by polymerase chain reaction (PCR) assay. We used two genes; fimH and kpsMTII, both of them previously identified in uropathogenic E.coli (UPEC) isolates. The PCR assay results identified fimH (90.0)% and kpsMTII (72.0)% isolates. In the present study, was also demonstrated that these genes may be included in both or one of them within a single isolate.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Internet Technology Letters,
The Blockchain for Healthcare 4.0 Apply in Standard Secure Medical Data Processing Architecture
...Show More Authors

Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Contemporary Challenges for Cloud Computing Data Governance in Information Centers: An analytical study
...Show More Authors

Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF